ManageEngine® Firewall Analyzer 7.0 Service Pack 6 Read Me
- Customers using Build 5000 or 4030 or 4031 or 4032 or 4033 or 4500 or 4023 or 4022 or 4021 or 4020 or 4012 or 4011 or 4010 or 4003 or 4002 or 4001 or 4000 contact fwanalyzer-support@manageengine.com
Note: If you are trying to apply more than one service pack at a time, you need to restart the Firewall Analyzer Server after applying each service pack and check whether your data is intact in the web client. If you don't have any issues, continue applying the other service pack. If you find any issues, do not continue applying the other service pack and contact fwanalyzer-support@manageengine.com
The feature enhancements and bug fixes in this Service Pack upgrade are listed below.
7.6 - Build 7600 - Distributed Edition
GA release of Firewall Analyzer Distributed Edition.
New Features - Admin Server
There are no new features available for Admin Server in this release
New Features - Collector Server
The general features available in this release include,
- Collector Server contains all the features of Firewall Analyzer Standalone Edition (see below)
7.6 - Build 7600 -Standalone Edition
The general features available in this release are:
New Features
- New Devices supported:
- FortiGate - FortiOS 5.x logs supported
- NetASQ
- PaloAlto - Application reports
- Bluecoat - Virus reports
- Option to identify non standard protocols (Unknown Protocol) detail in your network.
- Email alert notification when Firewall Analyzer fails to write the logs in archive
- SFTP/SSH protocol support to import logs from remote machines
- Optionally, traffic logs can be indexed and searched
- Advanced Search can now be used to find the exact Port/Protocol details
- Showing the conversation (source/destination/protocol) details for anomaly alert in mail
- Troubleshooting tool to apply License file in case of product license expiry
- Users with 'Guest' privilege can now access the'Compliance' tab
- Firewall Analyzer will henceforth be using PostgresSQL database
Bug Fix
- Wrong alert message showing double the number of managed devices compared to the License count has been fixed
- Fixed the Windows Authentication issue in Admin server MS SQL setup
- SonicWALL device interface name parsing issue is fixed
- Fixed the issue to retain the Y-axis value as integer in Time Series graph in PDF export
- Allowed URL reports will now be populated for Palo Alto devices
- Parsing issue of Juniper SSL logs fixed
- Native OS (German and French) Installation issue fixed
- 'DisplayName' of the device will be shown now in Change Management alerts, Anomaly alerts and Compliance reports instead of 'ResourceName'
7.4 - Build 7400 - Distributed Edition
GA release of Firewall Analyzer Distributed Edition.
New Features - Admin Server
The general features available in this release include,
- Dedicated compliance section for device rules configurations, firewall rules monitoring, change management reports and alerts for each collector server
New Features - Collector Server
The general features available in this release include,
- Collector Server contains all the features of Firewall Analyzer Standalone Edition
7.4 - Build 7400 - Standalone Edition
The general features available in this release are:
New Features
- Supports 'IPFIX with extensions' based flows (for SonicOS 5.8) - reports include top URLs, applications, users, viruses, attacks, intrusions, spyware, etc.
- Dedicated compliance section for device rules configurations, firewall rules monitoring, change management reports and alerts
- Detailed reports for applications accessed through Check Point and SonicWALL devices
- Consolidated VPN traffic reports for user-groups
- 'Exclude criteria' option now allows users to generate configuration change management reports that excludes certain specific lines or text
- Importing 'Local Host' log directory is now supported
- 'Intranet Settings' can now be configured for multiple devices
- For FTP log import from remote hosts, in addition to specifying time interval users can now specify 'Schedule Start Time'
- 'Scheduled Reports' can be now saved in the machine running Firewall Analyzer
- Active Directory or RADIUS can be set as default authentication for Firewall Analyzer login
- Active Directory Users can now be imported at the Organizational Unit level, Group level and Individual User level
Bug Fix
- Fixed indexing of Juniper IDP attack logs
- Increased the default value of row count of reports in PDF format from 10 to 100
- Fixed the usability issue in Scheduling Device Rule
- Fixed the Parser Rule issue for Cisco Message Id 713119
- Fixed Change Management Alert issue when difference in configuration content has dollar symbol in it
- Fixed the 'device credentials test button' issue
- Fixed issue in detecting dynamic file name changes, during scheduled import
- The issue with 'SNMP community string with special characters' to access the interface is fixed
- The issue in parsing unused ACEs of Cisco firewall is fixed
7.2 - Build 7021 - Standalone Edition
The bug fix available in this release are:
Bug Fix
- Optimized the connection between Firewall and Firewall Analyzer, to fetch rules
Build 7020 - Distributed Edition
GA release of Firewall Analyzer Distributed Edition.
New Features - Collector Server
The general features available in this release include,
- Collector Server contains all the features of Firewall Analyzer Standalone Edition
Build 7020 - Standalone Edition
GA release of Firewall Analyzer Standalone Edition.
New Features and Enhancements
- New Device/Log Format supported
- Palo-Alto Firewall
- Juniper SSLVPN 6500
- Check Point VSX firewalls
- FortiGate Web filter, DLP, IPS modules and IPSec support
- Application reports for Fortigate firewalls based on Application Control service
- Support for Virtual Firewalls of Cisco and Fortigate devices. By default, each context/vdom is displayed as separate device
- Alerts based on bandwidth utilization of a specific interfaces
- Client UI and email notification for Firewall Status Alerts for the following conditions:
- Lack of disk space
- Syslog server down
- View unused ACEs details of ACLs, for Cisco devices available in Unused Rules report
- Real-time Syslog collection from Squid proxy server supported
- Complete time duration details of the VPN user sessions available in 'VPN User Session Details' reports under VPN Reports
- Option to export 'VPN User Session Details' report to other formats, while clicking 'View All' link
- Zone based and interface specific Live reports using SNMP for Netscreen devices
- Change Management Report for Juniper SRX device available
- Option to fetch Rules and Configurations for any CLI supported device to get Unused Rules, Compliance and Change Management reports
- New format for Email alert to cater for context based Configuration Changes
- Optional privilege available to 'Guest' user to view the generated alerts for the assigned device(s)
- Optional privilege available to 'Guest' user to view the Report Profile(s) assigned by Administrators
Bug Fixes
- Identifying Device IP address from the logs imported from Blue Coat proxy server
- Collecting intermittent logs of VPN sessions support for Sonicwall, Cisco, Checkpoint and Netscreen Firewall
devices
- Added page navigation component in 'Raw Log Search' result page
- Importing log files with non-English names/folders from remote machines using FTP is supported
- Allowed special characters in SNMP Community string
to fetch SNMP data from devices
- Issue in Diagnose Connections when the interface name had special characters
ManageEngine Firewall Analyzer © 2013 ZOHO Corp. All Rights Reserved.